-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat(edit-profile): Implement password update feature
- Implement the feature to allow users update their password - Added validation check for old password, new password and confirm password - hash the new password before updating - documented the feature using swagger [Delivers #187419174] Feat(authentication): implementation of google authentication - Add signin and sign up with google account - return access token - added test delivers #187419170 --amend Feat(authentication): implementation of google authentication - Add signin and sign up with google account - return access token - added test delivers #187419170 Fixed missing login body in swagger doc fix: fixed 2fa implemetation by replacing verification link with otp code fix(profile-edit): fix password not being updated in the database - fixed the issue of password not being updated in the database [Fixes #187419174]
- Loading branch information
1 parent
ac7da2f
commit 9ff45bd
Showing
22 changed files
with
621 additions
and
74 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -3,20 +3,34 @@ import { beforeAll, afterAll, jest, test } from "@jest/globals"; | |
import app from "../src/utils/server"; | ||
import User from "../src/sequelize/models/users"; | ||
import * as userServices from "../src/services/user.service"; | ||
import * as mailServices from "../src/services/mail.service"; | ||
import sequelize, { connect } from "../src/config/dbConnection"; | ||
|
||
const userData: any = { | ||
name: "yvanna", | ||
username: "testuser", | ||
email: "[email protected]", | ||
password: "test1234", | ||
name: "yvanna5", | ||
username: "testuser5", | ||
email: "[email protected]", | ||
password: "test12345", | ||
}; | ||
|
||
const dummySeller = { | ||
name: "dummyseller", | ||
username: "username", | ||
email: "[email protected]", | ||
password: "1234567890", | ||
role: "seller", | ||
}; | ||
const userTestData = { | ||
newPassword: "Test@123", | ||
confirmPassword: "Test@123", | ||
wrongPassword: "Test456", | ||
}; | ||
|
||
const loginData: any = { | ||
email: "[email protected]", | ||
password: "test1234", | ||
}; | ||
describe("Testing a user Routes", () => { | ||
describe("Testing user Routes", () => { | ||
beforeAll(async () => { | ||
try { | ||
await connect(); | ||
|
@@ -30,49 +44,138 @@ describe("Testing a user Routes", () => { | |
await User.destroy({ truncate: true }); | ||
await sequelize.close(); | ||
}); | ||
let token: any; | ||
describe("Testing user authentication", () => { | ||
test("should return 201 and create a new user when registering successfully", async () => { | ||
const response = await request(app).post("/api/v1/users/register").send(userData); | ||
const response = await request(app) | ||
.post("/api/v1/users/register") | ||
.send(userData); | ||
expect(response.status).toBe(201); | ||
}, 40000); | ||
}, 20000); | ||
|
||
test("should return 409 when registering with an existing email", async () => { | ||
User.create(userData); | ||
const response = await request(app).post("/api/v1/users/register").send(userData); | ||
const response = await request(app) | ||
.post("/api/v1/users/register") | ||
.send(userData); | ||
expect(response.status).toBe(409); | ||
}, 40000); | ||
}, 20000); | ||
|
||
test("should return 400 when registering with an invalid credential", async () => { | ||
const userData = { | ||
email: "[email protected]", | ||
name: "", | ||
username: "existinguser", | ||
}; | ||
const response = await request(app).post("/api/v1/users/register").send(userData); | ||
const response = await request(app) | ||
.post("/api/v1/users/register") | ||
.send(userData); | ||
|
||
expect(response.status).toBe(400); | ||
}, 40000); | ||
}, 20000); | ||
}); | ||
|
||
test("should return all users in db --> given '/api/v1/users'", async () => { | ||
const spy = jest.spyOn(User, "findAll"); | ||
const spy2 = jest.spyOn(userServices, "getAllUsers"); | ||
const response = await request(app).get("/api/v1/users"); | ||
expect(spy).toHaveBeenCalled(); | ||
expect(spy2).toHaveBeenCalled(); | ||
}, 20000); | ||
test("Should return status 401 to indicate Unauthorized user", async () => { | ||
const loggedInUser = { | ||
email: userData.email, | ||
password: "test", | ||
}; | ||
const spyonOne = jest.spyOn(User, "findOne").mockResolvedValueOnce({ | ||
//@ts-ignore | ||
email: userData.email, | ||
password: loginData.password, | ||
}); | ||
const response = await request(app) | ||
.post("/api/v1/users/login") | ||
.send(loggedInUser); | ||
expect(response.body.status).toBe(401); | ||
spyonOne.mockRestore(); | ||
}, 20000); | ||
|
||
test("Should send otp verification code", async () => { | ||
const spy = jest.spyOn(mailServices, "sendEmailService"); | ||
const response = await request(app).post("/api/v1/users/login").send({ | ||
email: dummySeller.email, | ||
password: dummySeller.password, | ||
}); | ||
|
||
expect(response.body.message).toBe("OTP verification code has been sent ,please use it to verify that it was you"); | ||
// expect(spy).toHaveBeenCalled(); | ||
}, 40000); | ||
|
||
test("should log a user in to retrieve a token", async () => { | ||
const response = await request(app).post("/api/v1/users/login").send({ | ||
email: userData.email, | ||
password: userData.password, | ||
}); | ||
expect(response.status).toBe(200); | ||
token = response.body.token; | ||
}); | ||
|
||
test("should return 400 when adding an extra field while updating password", async () => { | ||
const response = await request(app) | ||
.put("/api/v1/users/passwordupdate") | ||
.send({ | ||
oldPassword: userData.password, | ||
newPassword: userTestData.newPassword, | ||
confirmPassword: userTestData.confirmPassword, | ||
role: "seller", | ||
}) | ||
.set("Authorization", "Bearer " + token); | ||
expect(response.status).toBe(400); | ||
}); | ||
|
||
test("should return 401 when updating password without authorization", async () => { | ||
const response = await request(app) | ||
.put("/api/v1/users/passwordupdate") | ||
.send({ | ||
oldPassword: userData.password, | ||
newPassword: userTestData.newPassword, | ||
confirmPassword: userTestData.confirmPassword, | ||
}); | ||
expect(response.status).toBe(401); | ||
}); | ||
|
||
test("should return 200 when password is updated", async () => { | ||
const response = await request(app) | ||
.put("/api/v1/users/passwordupdate") | ||
.send({ | ||
oldPassword: userData.password, | ||
newPassword: userTestData.newPassword, | ||
confirmPassword: userTestData.confirmPassword, | ||
}) | ||
.set("Authorization", "Bearer " + token); | ||
expect(response.status).toBe(200); | ||
}); | ||
|
||
test("should return 400 when confirm password and new password doesn't match", async () => { | ||
const response = await request(app) | ||
.put("/api/v1/users/passwordupdate") | ||
.send({ | ||
oldPassword: userData.password, | ||
newPassword: userTestData.newPassword, | ||
confirmPassword: userTestData.wrongPassword, | ||
}) | ||
.set("Authorization", "Bearer " + token); | ||
expect(response.status).toBe(400); | ||
}); | ||
}); | ||
|
||
test("should return all users in db --> given '/api/v1/users'", async () => { | ||
const spy = jest.spyOn(User, "findAll"); | ||
const spy2 = jest.spyOn(userServices, "getAllUsers"); | ||
const response = await request(app).get("/api/v1/users"); | ||
expect(spy).toHaveBeenCalled(); | ||
expect(spy2).toHaveBeenCalled(); | ||
}, 40000); | ||
test("Should return status 401 to indicate Unauthorized user", async () => { | ||
const loggedInUser = { | ||
email: userData.email, | ||
password: "test", | ||
}; | ||
const spyonOne = jest.spyOn(User, "findOne").mockResolvedValueOnce({ | ||
//@ts-ignore | ||
email: userData.email, | ||
password: loginData.password, | ||
test("should return 400 when old password is incorrect", async () => { | ||
const response = await request(app) | ||
.put("/api/v1/users/passwordupdate") | ||
.send({ | ||
oldPassword: userTestData.wrongPassword, | ||
newPassword: userTestData.newPassword, | ||
confirmPassword:userTestData.wrongPassword, | ||
}) | ||
.set("Authorization", "Bearer " + token); | ||
expect(response.status).toBe(400); | ||
}); | ||
const response = await request(app).post("/api/v1/users/login").send(loggedInUser); | ||
expect(response.body.status).toBe(401); | ||
spyonOne.mockRestore(); | ||
}); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.